RAMADHANIL, MUHAMMAD and Stiawan, Deris and Afifah, Nurul (2024) KLASIFIKASI MALWARE TROJAN HORSE MENGGUNAKAN METODE LONG SHORT TERM MEMORY (LSTM). Undergraduate thesis, Sriwijaya University.
Preview |
Image
RAMA_56201_09011382025101_cover.jpg - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (285kB) | Preview |
Text
RAMA_56201_09011382025101.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011382025101_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (6MB) | Request a copy |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (529kB) | Request a copy |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (786kB) | Request a copy |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (12kB) | Request a copy |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (124kB) | Request a copy |
|
Text
RAMA_56201_09011382025101_0003047905_8958340022_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (527kB) | Request a copy |
Abstract
Trojan horse is a cyber attack that is carried out by disguising or infiltrating a system through programs or files that appear normal and harmless. Trojan horses can gain unauthorized access into computer systems allowing hackers to carry out various types of attacks and steal users' personal information by taking control of the system remotely. In addition, advances in cyber attack technology and techniques continue to expand the functionality and capabilities of Trojans, making them increasingly difficult to detect and defeat. Therefore, this study proposes to use the Long Short-Term Memory (LSTM) method which is an artificial intelligence technology part of neural networks that has become an effective and sophisticated approach in dealing with cyber threats that continue to grow, especially in trojan horses. This study uses a dataset of 31,265 from CIC-MalMem- 2022. The results show that the LSTM model is able to achieve an accuracy of 99%. These results identify that the LSTM model has reliable performance in performing classification. Keywords: Long Short-Term Memory (LSTM), Trojan Horse, Resampling Data
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Kata Kunci: Long Short-Term Memory (LSTM), Trojan Horse, Resampling Data |
Subjects: | T Technology > T Technology (General) > T1-995 Technology (General) |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Muhammad Ramadhanil |
Date Deposited: | 20 Jan 2025 07:27 |
Last Modified: | 20 Jan 2025 07:27 |
URI: | http://repository.unsri.ac.id/id/eprint/165873 |
Actions (login required)
View Item |